- Physical Computer Security involves preventing theft,…destruction, or tampering of computers, network hardware,…or devices, such as an overhead projector.…Examples include cutting a fiber optic backbone,…theft of a computer or handheld device,…or removing RAM or components from a desktop or laptop.…There are several Best Practices…for physical computer security,…but they all involve physical security.…

For example, secure access to buildings and rooms,…such as server rooms, by using locks, or access cards,…and use surveillance, and monitor who enters and exits…those rooms.…Audit services, users, and administrators…to verify compliance with security policies.…Secure any backup media, even though this is your backup…and not live data, many times sensitive information is held…on that backup media.…Disable any external drives to that isn't a conduit…to extract data.…

Author

Released

10/27/2015

Network security is the keystone of IT security, and an important component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this installment of Foundations of IT Security, series creator Lisa Bock will cover one of the main topics of the exam: securing an organization's network to keep interconnected systems and data safe. The course introduces security devices such as firewalls and packet inspectors, network isolation, and common security protocols. She also provides an overview of how to protect clients with antivirus software, encrypt offline files, and implement software restriction policies. Finally, she looks at the often-overlooked topics of mobile device and physical security, which includes securing a building's perimeter and the hardware within.